Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Professional Hacker +
Module 1: Introduction to Information Security
M.1.1.1 Introduction to Information Security and CIA Triad (8:56)
M.1.1.2 Types of hacker (2:33)
M.1.1.3 Essential Terms (6:52)
M.1.1.4 Penetration Testing Vs Ethical Hacking (2:30)
M.1.1.5 Different Types of Testing (5:05)
M.1.1.6 Careers_in_Information_Security (4:16)
M.1.1.7 Legislation_and_Regulations (11:49)
M.1.2.1 OSI Model (18:47)
M.1.2.2 TCP IP Model (6:46)
M.1.2.3 Transmission Control Protocol (TCP) (12:18)
M.1.2.4 User Datagram Protocol (UDP) (12:18)
M.1.2.5 IP Fragmentation and Reassembly (3:53)
M.1.2.6 IPv4 (15:16)
M.1.2.7 IPv6 (13:46)
M.1.2.8 Understanding ICMP (5:09)
M.1.2.9 Understanding ICMP Ping Message (1:38)
M.1.3.1 Routing (6:50)
M.1.4.1 Windows NT Architecture and Windows 10 Architecture (24:53)
M.1.4.2 File System (7:11)
M.1.4.3 SAM File and System Files (5:38)
M.1.4.4 Windows Registry (3:23)
M.1.4.5 Windows Registry (4:19)
M.1.4.6 Windows Commands (4:37)
M.1.4.7 Windows Basic Commands (7:54)
M.1.4.8 Windows Server 2016 Architecture (9:15)
M.1.4.9 Active Directory (21:48)
M.1.5.1 Introduction to Unix and Linux (10:46)
M.1.5.2 File System (13:31)
M.1.5.3 Linux Commands (7:04)
M.1.5.4 File Permissions (9:14)
M.1.5.5 Kali Linux Introduction (1:44)
M.1.5.6 Kali and Various Linux Commands (8:37)
M.1.5.7 Kali and Various Linux Commands (2:24)
M.1 Introduction to Information Security (PDF)
Module-2 Social Engineering and Reconnaissance
M.2.1.1 Social Engineering (29:31)
M.2.1.2 Reconnaissance (24:27)
M.2.1.2.A Reconnaissance (Lab) (4:09)
M.2.1.2.B Reconnaissance (Lab) (0:43)
M.2.1.2.C Reconnaissance (Lab) (1:52)
M.2 Social Engineering Reconnaissance (PDF)
Module-3 Network Scanning
M.3.1.1 Packet Crafting (3:31)
M.3.1.1.A Packet Crafting (Lab) (2:04)
M.3.1.1.B Packet Crafting (Lab) (3:40)
M.3.1.1.C Packet Crafting (Lab) (2:00)
M.3.1.1.D Packet Crafting (Lab) (1:00)
M.3.1.2 Network Mapper Nmap (12:17)
M.3.1.2.A Network Mapper(Nmap) (Lab) (4:42)
M.3.1.2.B Network Mapper(Nmap) (Lab) (4:03)
M.3.1.2.C Network Mapper(Nmap) (Lab) (0:55)
M.3.1.2.D Network Mapper(Nmap) (Lab) (2:34)
M.3 Network Scanning (PDF)
Module-4 Enumeration
M.4.1.1 Banner grabbing enumeration (23:51)
M.4.1.1.A Enumeration using Netcat Lab (Lab) (1:00)
M.4.1.1.B HTTP Lab (Lab) (1:50)
M.4.1.1.C SMTP Lab (Lab) (5:50)
M.4.1.1.D DNS Lab (Lab) (1:14)
M.4.1.1.E Automated Scanning Nessus Lab (Lab) (2:49)
M.4 Enumeration (PDF)
Module - 5 Exploitation
M.5.1.1 Hacking System password Cracking (46:55)
M.5.1.1.A Password Cracking Lab (Lab) (1:55)
M.5.1.1.B Password Cracking Lab (Lab) (1:10)
M.5.1.1.C Password Cracking Lab (Lab) (3:10)
M.5.1.1.D Password Cracking Lab (Lab) (2:02)
M.5.1.2 Metasploit Framework (10:36)
M.5.1.3 Linux Service Exploit (1:25)
M.5.1.4 Windows Service Exploitation (1:47)
M.5.1.5 Windows Msfvenom (1:33)
M.5 Exploitation (PDF)
Module- 6 WebAppSecurity
M.6.1.1 Introduction to Web Applications (2:28)
M.6.1.2 Case Studies (17:26)
M.6.1.3 Web Applications brief (7:41)
M.6.1.4 HTML and JavaScript (5:03)
M.6.2.1 Introduction to OWASP TOP 10 (3:25)
M.6.2.2 Injection and Error based Injection (9:10)
M.6.2.2.A Injection and Error based Injection (Lab) (6:14)
M.6.2.3 Authentication Bypass using SQL Injection (1:39)
M.6.2.3.A Authentication_Bypass_using_SQL_Injection (Lab) (3:20)
M.6.2.4 Blind Injection using SQLMap (5:05)
M.6.2.4.A Blind_Injection_using_SQLMap. (Lab) (2:45)
M.6.2.5 SQL Injection Mitigations Page (10:25)
M.6.2.6 Command Injection (7:02)
M.6.2.6.A Command Injection (Lab) (2:08)
M.6.2.7 Broken Authentication (5:52)
M.6.2.7.A Brute Force (Lab) (2:53)
M.6.2.7.B Brute Force (Lab) (3:22)
M.6.2.8 Session Management (8:39)
M.6.2.8.A Session Management (2:23)
M.6.2.9 A3 Sensitive Data Exposure (3:53)
M.6.2.9.A A3 Sensitive Data Exposure (Lab) (1:45)
M.6.2.10 A3 Insufficient Transport Layer Security (6:27)
M.6.2.10.A A3 Insufficient Transport Layer Security (1:12)
M.6.2.11 A4_XXE (9:30)
M.6.2.11.A A4_XXE (Lab) (2:10)
M.6.2.12 A5 Broken Access Control IDOR (5:45)
M.6.2.12.A A5 Broken Access Control IDOR (Lab) (1:08)
M.6.2.13 A5 Broken Access Control MFLAC (6:05)
M.6.2.13.A A5 Broken Access Control MFLAC (Lab) (0:52)
M.6.2.13.B A5 Broken Access Control MFLAC (Lab) (1:00)
M.6.2.13.C A5 Broken Access Control MFLAC (Lab) (2:36)
M.6.2.14 A6 Security Misconfiguration (6:42)
M.6.2.14.A A6 Security Misconfiguration (Lab) (1:55)
M.6.2.14.B A6 Security Misconfiguration (Lab) (1:00)
M.6.2.14.C A6 Security Misconfiguration (Lab) (1:35)
M.6.2.15 A7 Cross Site Scripting(XSS) (18:42)
M.6.2.15.A A7 Cross Site Scripting(XSS) (Lab) (3:24)
M.6.2.16 A8 Insecure Deserialization (4:56)
M.6.2.17 A9 Using components with Known Vulnerabilities (5:11)
M.6.2.17.A A9 Using components with Known Vulnerabilities (Lab) (2:03)
M.6.2.18 A10 Insufficient Logging and Monitoring (4:30)
M.6.3.1 Browser Based Vulnerabilties (2:58)
M.6.3.2 Clickjacking (3:01)
M.6.3.2.A Clickjacking (Lab) (2:16)
M.6.3.3 POODLE (3:57)
M.6.3.4 WebDav (3:58)
M.6.3.5 WASC (3:37)
M.6.3.6 Security Frameworks (15:05)
M.6.3.7 SDLC (22:04)
M.6.3.8 WAF (7:53)
M.6.3.9 Case Study Penetrating a Bank (3:27)
M.6.3.10 Content Spoofing (4:37)
M.6.3.11 Fingerprinting (1:46)
M.6.3.12 Advance Recon (0:51)
M.6 WebAppSecurity (PDF)
Module 7-Wireless Exploitation
M.7.1.1 Introduction and Terminologies (11:58)
M.7.1.2 WiFi Frames (5:26)
M.7.1.3 Wireless Hacking Methodology (2:28)
M.7.1.4 Authentication Methods and Types of WLAN Attacks (2:52)
M.7.1.5 WEP (4:40)
M.7.1.6 WPA_WPA-2 (4:38)
M.7.1.7 Differences in WEP WPA and WPA-2 (7:19)
M.7.1.8 Bypassing WPA2 using Aircrack-ng (4:29)
M.7.1.8.A Aircrack-ng Setup (Lab) (1:12)
M.7.1.8.B WPA2 Bypass Aircrack-ng (Lab) (2:43)
M.7.1.9 Evil Twin (1:31)
M.7.1.9.A Evil Twin (Lab) (3:15)
M.7.1.10 WPA3 and Wi-Fi Guideline (2:02)
M.7 Wireless Exploitation (PDF)
M.7 Wireless Exploitation MCQ Quiz
Quiz 15 Questions
Module - 8 Cryptography, Steganography & Malware
M.8.1.1 Introduction to Cryptography (4:22)
M.8.1.2 Types of Cryptography and Ciphers (7:47)
M.8.1.3 Public Key Infrastructure (8:16)
M.8.1.4 Disk Encryption (4:18)
M.8.1.5 Crypt Analysis (3:39)
M.8.1.6 Steganography (4:00)
M.8.1.7 Malware (8:34)
M.8.1.8 Malware Analysis (2:57)
M.8 Cryptography Stegnography Malware (PDF)
M.8 Cryptography Stegnography Malwares MCQ Quiz
Quiz 20 Questions
Module 9-Mobile Application Security
M.9.1.1 Android Application Basics (1:03)
M.9.1.2 Android Application Components (4:34)
M.9.1.3 Setting Up Android Testing Environment (1:00)
M.9.1.4 ADB and its Commands (1:46)
M.9.1.4.A ADB and its Commands (Lab) (1:38)
M.9.1.4.B ADB and its Commands (Lab) (1:30)
M.9.1.4.C ADB and its Commands (Lab) (1:40)
M.9.1.4.D ADB and its Commands (Lab) (1:50)
M.9.1.5 Application Signing in Android (2:39)
M.9.1.5.A Application Signing in Android (1:56)
M.9.1.6 APK File Basics (1:47)
M.9.1.6.A APK File Basics (Lab) (1:20)
M.9.1.6.B APK File Basics (Lab) (2:37)
M.9.1.7 Mobile-OWASP Top 10 Improper Platform Usage (0:31)
M.9.1.7.A Mobile-OWASP Top 10 Improper Platform Usage (Lab) (3:35)
M.9.1.8 Mobile OWASP Top 10 Insecure Data Storage (0:38)
M.9.1.8.A Mobile OWASP Top 10 Insecure Data Storage (Lab) (2:28)
M.9.1.9 Mobile OWASP Top 10 Insecure Communication (0:17)
M.9.1.9.A Mobile OWASP Top 10 Insecure Communication (Lab) (1:56)
M.9.1.10 Mobile OWASP Top 10 Insecure Authentication (0:18)
M.9.1.10.A Mobile OWASP Top 10 Insecure Authentication (Lab) (1:44)
M.9.1.11 Mobile OWASP Top 10 Insufficient Cryptography (0:22)
M.9.1.11.A Mobile OWASP Top 10 Insufficient Cryptography (Lab) (4:31)
M.9.1.12 Mobile OWASP Top 10 Insecure Authorization (0:19)
M.9.1.12.A Mobile OWASP Top 10 Insecure Authorization (Lab) (1:28)
M.9.1.13 Mobile OWASP Top 10 Poor Code Quality (0:18)
M.9.1.13.A Mobile OWASP Top 10 Poor Code Quality (Lab) (1:44)
M.9.1.14 Mobile OWASP Top 10 Code Tampering and Reverse Engineering (1:10)
M.9.1.14.A Mobile OWASP Top 10 Code Tampering and Reverse Engineering (Lab) (5:16)
M.9.1.15 Mobile OWASP Top 10 Extraneous Functionality (0:23)
M.9.1.15.A Mobile OWASP Top 10 Extraneous Functionality (Lab) (1:44)
M.9.1.16 Mobile Application Security Testing (8:21)
M.9.1.16.A Mobile Application Security Testing (Lab) (3:03)
M.9.1.16.B Mobile Application Security Testing (Lab) (2:05)
M.9.1.16.C Mobile Application Security Testing (Lab) (4:20)
M.9.1.17 Other Vulnerabilities Client Side Injections (1:04)
M.9.1.17.A Other Vulnerabilities Client Side Injections (Lab) (2:36)
M.9.1.18 Other Vulnerabilities Logging Based Vulnerabilities (0:54)
M.9.1.19 Other Vulnerabilities Bypassing SSL Pinning (1:45)
M.9.1.19.A Other Vulnerabilities Bypassing SSL Pinning (Lab) (3:10)
M.9.1.20 Other Vulnerabilities Leaking Content Provider (1:07)
M.9.1.20.A Other Vulnerabilities Leaking Content Provider (Lab) (4:30)
M.9.1.21 Exploiting Android with Metasploit Framework (0:35)
M.9 MobileSecurity (PDF)
Module -10 Cloud Security
M.10.1.1 Introduction to Cloud Security (1:47)
M.10.1.2 Virtualiztion (0:54)
M.10.1.3 Service and Deployment Models (3:45)
M.10.1.4 Cloud taxonomy (2:02)
M.10.1.5 OWASP TOP 10 for Cloud (10:23)
M.10.1.6 Cloud Security Best Practices (3:30)
M.10 Cloud Security
M.10 Cloud Security MCQ Quiz
Quiz 10 Questions
Module - 11 - IoT
M.11.1.1 Introduction to IoT (3:00)
M.11.1.2 Application and Benefits of IoT (6:15)
M.11.1.3 Issues with IoT (1:26)
M.11.1.4 Basic Architecture of IoT (3:19)
M.11.1.5 Frameworks and Platform for IoT (3:17)
M.11.1.6 IoT Attack Surface (8:23)
M.11.1.7 IoT Attack Surface Hardware (2:51)
M.11 Internet of Things
M.11 Internet of Things MCQ
Quiz 10 Questions
M.9.1.14 Mobile OWASP Top 10 Code Tampering and Reverse Engineering
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock